Skip to main content

CVE-2025-26665: CWE-591: Sensitive Data Storage in Improperly Locked Memory in Microsoft Windows 10 Version 1809

High
VulnerabilityCVE-2025-26665cvecve-2025-26665cwe-591
Published: Tue Apr 08 2025 (04/08/2025, 17:23:06 UTC)
Source: CVE
Vendor/Project: Microsoft
Product: Windows 10 Version 1809

Description

Sensitive data storage in improperly locked memory in Windows upnphost.dll allows an authorized attacker to elevate privileges locally.

AI-Powered Analysis

AILast updated: 07/11/2025, 03:48:29 UTC

Technical Analysis

CVE-2025-26665 is a high-severity vulnerability identified in Microsoft Windows 10 Version 1809, specifically affecting the upnphost.dll component. The vulnerability is categorized under CWE-591, which relates to sensitive data storage in improperly locked memory. This means that sensitive information is stored in memory regions that are not adequately protected against unauthorized access. An authorized local attacker with limited privileges can exploit this flaw to elevate their privileges on the affected system. The vulnerability arises because the upnphost.dll module fails to lock memory properly, allowing sensitive data to be exposed or manipulated. Exploitation does not require user interaction but does require local access with some privileges (PR:L). The attack complexity is high (AC:H), indicating that exploitation may require specific conditions or expertise. The vulnerability impacts confidentiality, integrity, and availability, as indicated by the CVSS vector (C:H/I:H/A:H). No known exploits are currently reported in the wild, and no patches have been linked yet, suggesting that mitigation may rely on workarounds or system hardening until official updates are released. The vulnerability was published on April 8, 2025, with a CVSS v3.1 score of 7.0, reflecting its significant risk level.

Potential Impact

For European organizations, this vulnerability poses a substantial risk, especially in environments where Windows 10 Version 1809 is still in use. The ability for a local attacker to escalate privileges can lead to unauthorized access to sensitive data, disruption of services, and potential lateral movement within networks. This is particularly critical for sectors handling sensitive personal data under GDPR, such as healthcare, finance, and government institutions. The exposure of sensitive data in memory can lead to data breaches, regulatory penalties, and reputational damage. Additionally, the integrity and availability impacts could disrupt business operations, especially if attackers leverage elevated privileges to deploy ransomware or other malicious payloads. Organizations relying on legacy systems or with insufficient patch management processes are at higher risk. Since exploitation requires local access, insider threats or compromised endpoints are the most likely attack vectors.

Mitigation Recommendations

1. Immediate mitigation should focus on restricting local access to systems running Windows 10 Version 1809, ensuring only trusted users have login capabilities. 2. Implement strict endpoint security controls, including application whitelisting and behavior monitoring, to detect and prevent unauthorized privilege escalation attempts. 3. Employ memory protection tools or third-party solutions that can detect or prevent improper memory handling. 4. Conduct thorough audits of systems to identify any instances of Windows 10 Version 1809 still in operation and prioritize their upgrade to supported, patched versions of Windows. 5. Apply principle of least privilege rigorously to limit the impact of any local compromise. 6. Monitor system logs and security alerts for unusual local privilege escalation activities. 7. Once Microsoft releases an official patch, prioritize its deployment across all affected systems. 8. Educate users and administrators about the risks of local privilege escalation and enforce strong physical and network access controls to reduce insider threat risks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2025-02-12T22:35:41.548Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f91484d88663aebb3e

Added to database: 5/20/2025, 6:59:05 PM

Last enriched: 7/11/2025, 3:48:29 AM

Last updated: 8/17/2025, 5:59:00 AM

Views: 36

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats